Top IT Security Bloggers

  • TrickBot Banker Insights

    Arbor Networks
    A new banking trojan, TrickBot, has seemingly risen from the ashes left behind by the November 2015 takedown of Dyreza/Dyre infrastructure and the arrests of threat actors identified by Russian authorities. Dyreza was used to target customers of over 1000 U.S. and U.K. banks and other companies during the peak of operations. Researchers at Threat Geek […]
  • Senator Prods Federal Agencies on IoT Mess

    Krebs on Security
    The co-founder of the newly launched Senate Cybersecurity Caucus is pushing federal agencies for possible solutions and responses to the security threat from insecure "Internet of Things" (IoT) devices, such as the network of hacked security cameras and digital video recorders that were reportedly used to help bring about last Friday's major Internet outages.
  • DirtyCOW Linux hole works on Android too – “root at will”

    Sophos - Naked Security
    Turns out that the DirtyCOW Linux exploit can be used on Android, too. Rooters will be delighted, sysadmins might not be.
  • Apple iOS users taste Android anxiety with nasty CoreGraphics image flaw

    Sophos - Naked Security
    Apple's latest round of patches is a reminder that mobile platforms aren't very different to one another: they all run software and they are all fragile
  • 6 Scariest Faces of Ransomware

    Trend Micro - Cloud Security Blog
    This time of year is full of thrills and chills, but no online threat is quite as scary as ransomware. While it comes in many forms, the overall gist is that ransomware locks files on a computer and holds them ransom unless a fine is paid. In the first half of 2016 alone, there has...
  • Use of Pagers in ICS Pose Challenges

    Trend Micro - Cloud Security Blog
    In a follow-on report to our recent one involving the use of pagers in healthcare, Trend Micro Forward-Looking Research (FTR) team also analyzed the use of pager communications in industrial environments.  This report will look at how and why these environments still utilize pagers and the potential security concerns due to this unencrypted channel. The...
  • How hackers broke into John Podesta, DNC Gmail accounts

    Sophos - Naked Security
    At the heart of enormous breaches lies a tiny thing: rigged Bitly shortened URLs.
  • Leaking Beeps: Are You In Control Of Your Own Automation?

    Trend Micro - Security Intelligence
    Industrial Control Systems (ICS) are a hot topic in the security industry today, thanks to the prevalence of software that is often riddled with security flaws and legacy protocols that were designed without any type of security. Many of these systems were designed in a different time, when the world was quite different. ICS systems used to be isolated, Internet access was rare and expensive, and hacking knowledge was not as widespread as it is today. It would be very difficult for a programmer to have foreseen some of the security issues that have now come about. As a result, however, this often translates to cases where solutions are developed to get the most out of the system while maintaining a cost-conscious mindset. As a result, there are cases where software and protocols that were never meant to be part of an ICS system end up as part of such a system.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    Leaking Beeps: Are You In Control Of Your Own Automation?
  • Leaking Beeps: Are You In Control Of Your Own Automation?

    TrendLabs - Malware Blog
    Industrial Control Systems (ICS) are a hot topic in the security industry today, thanks to the prevalence of software that is often riddled with security flaws and legacy protocols that were designed without any type of security. Many of these systems were designed in a different time, when the world was quite different. ICS systems used to be isolated, Internet access was rare and expensive, and hacking knowledge was not as widespread as it is today. It would be very difficult for a programmer to have foreseen some of the security issues that have now come about. As a result, however, this often translates to cases where solutions are developed to get the most out of the system while maintaining a cost-conscious mindset. As a result, there are cases where software and protocols that were never meant to be part of an ICS system end up as part of such a system.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    Leaking Beeps: Are You In Control Of Your Own Automation?
  • VASCO white paper- Strong authentication to solve your everyday banking problems

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at VASCO Data Security. Thanks to the great team there for their support!
    Experts argue that e-banking authentication has become so stagnant since the 2005 Guidance that it is no longer considered "cool" or innovative. Tokens, key fobs, mobile tokens, SMS codes, phone calls certainly did their job confirming a customer’s identity and combating cyber-attacks for many years. What has changed since 2005?
    We want you to pause for a moment and take a fresh look at how strong authentication can serve banks in areas you never thought of using it for. Can strong authentication help achieve a much needed convenience, security, and cost savings beyond online banking login?
    Discover nine innovative use cases from VASCO that will help you visualize how application security, multi-factor authentication, and fraud prevention solutions can play out to create a secure and frictionless user experience.
    Download this executive summary by American Banker and VASCO to learn more about:

    Authentication across all channels
    Convenient retail mobile banking
    Cardless ATM
    Bank card PIN issuance and mailers
    Call center and IVR authentication
    ACH batch payments
    Functionality vs security in commercial mobile banking app
    Cross-channel authentication for commercial banking
    Branch employee and device authentication

    Interested in learning more? Download VASCO's white paper on how to Innovate with Strong Authentication to Solve your Everyday Banking Problems.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release